article thumbnail

Google’s Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Tech Republic Security

In a new report from Google's Threat Analysis Group, the researchers detail how commercial surveillance vendors particularly use spyware and target Google and Apple devices.

Spyware 171
article thumbnail

Pegasus Spyware Discovered on Spanish PM's Phone

SecureWorld News

The highly controversial Pegasus spyware has been found on the mobile phones of Spain's prime minister Pedro Sánchez, as well as the defense minister Margarita Robles, according to the Spanish government. Pegasus spyware remains problematic around the world. The Spanish government has promised an internal investigation into the CNI.

Spyware 85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

New FurBall Android Malware Used to Spy on Iranian Citizens

SecureWorld News

However, this recent version of FurBall that was discovered is slightly different from what Domestic Kitten has used in the past, according to ESET malware researcher Lukas Stefanko. This version has similar spyware functionality as before, except " the threat actors slightly obfuscated class and method names, strings, logs, and server URIs."

Malware 83
article thumbnail

Breaking: Apple Sues 'Abusive State-Actor' NSO Group

SecureWorld News

The steps we’re taking today will send a clear message: In a free society, it is unacceptable to weaponize powerful state-sponsored spyware against those who seek to make the world a better place.". That behavior by NSO Group, according to Citizen Lab and Apple, includes secret installation of Pegasus Spyware. And he didn't stop there.

Groups 73
article thumbnail

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

Here are my key take-aways from this year’s research: In every measure that matters, in every category, the bad guys are getting faster by automating. 92% of attacks studied in this research can be described and categorized by nine basic attack patterns of: Crimeware. Web application attacks. Insider Misuse. DoS attacks.

Report 310
article thumbnail

17 Apps Removed from Google Play for Joker Malware

SecureWorld News

Even though Google is very much aware of this cyber threat, it manages to keep finding its way into their official application market. A Zscaler research team has been monitoring Joker malware and notified Google of the recent uploads to the Google Play store. In total, there were around 120,000 downloads of the affected apps.

Malware 69
article thumbnail

The Zero Click, Zero Day iMessage Attack Against Journalists

SecureWorld News

Pegasus spyware is a phone surveillance solution that enables customers to remotely exploit and monitor devices. He was concerned that his phone had been hacked he contacted Toronto's Citizen Lab and agreed to let them install a VPN application that would give researchers a chance to track metadata associated with his Internet traffic.

Spyware 52